www.gnno-aozora3.cyou
Open in
urlscan Pro
87.121.112.81
Malicious Activity!
Public Scan
Effective URL: https://www.gnno-aozora3.cyou/ibg/client/index.php
Submission: On February 23 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on February 23rd 2024. Valid for: 3 months.
This is the only time www.gnno-aozora3.cyou was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: GMO Aozora Net Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 22 | 87.121.112.81 87.121.112.81 | 34224 (NETERRA-AS) (NETERRA-AS) | |
21 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
gnno-aozora3.cyou
1 redirects
www.gnno-aozora3.cyou |
650 KB |
21 | 1 |
Domain | Requested by | |
---|---|---|
22 | www.gnno-aozora3.cyou |
1 redirects
www.gnno-aozora3.cyou
|
21 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.gnno-aozora3.cyou R3 |
2024-02-23 - 2024-05-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.gnno-aozora3.cyou/ibg/client/index.php
Frame ID: FD5354C7FBBB1F15DE951E288B3BE786
Requests: 21 HTTP requests in this frame
Screenshot
Page Title
GMOあおぞらネット銀行 ログインPage URL History Show full URLs
-
https://www.gnno-aozora3.cyou/
HTTP 302
https://www.gnno-aozora3.cyou/ibg/client/index.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- (?:/([\d.]+))?/vue(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.gnno-aozora3.cyou/
HTTP 302
https://www.gnno-aozora3.cyou/ibg/client/index.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.php
www.gnno-aozora3.cyou/ibg/client/ Redirect Chain
|
10 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
reset.css
www.gnno-aozora3.cyou/ibg/css/ |
2 KB 966 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.css
www.gnno-aozora3.cyou/ibg/css/ |
12 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner.css
www.gnno-aozora3.cyou/ibg/css/ |
2 KB 937 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
www.gnno-aozora3.cyou/ibg/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner-title.png
www.gnno-aozora3.cyou/ibg/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sp-banner-title.png
www.gnno-aozora3.cyou/ibg/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
in-banner-01.png
www.gnno-aozora3.cyou/ibg/img/ |
91 KB 91 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
in-sp-banner-01.png
www.gnno-aozora3.cyou/ibg/img/ |
88 KB 89 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
in-banner-02.png
www.gnno-aozora3.cyou/ibg/img/ |
56 KB 57 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
in-sp-banner-02.png
www.gnno-aozora3.cyou/ibg/img/ |
64 KB 65 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
in-banner-03.png
www.gnno-aozora3.cyou/ibg/img/ |
29 KB 29 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
in-sp-banner-03.png
www.gnno-aozora3.cyou/ibg/img/ |
33 KB 33 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner-pickup.png
www.gnno-aozora3.cyou/ibg/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sp-banner-pickup.png
www.gnno-aozora3.cyou/ibg/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
in-banner-04.png
www.gnno-aozora3.cyou/ibg/img/ |
33 KB 33 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
in-sp-banner-04.png
www.gnno-aozora3.cyou/ibg/img/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vue.js
www.gnno-aozora3.cyou/ibg/js/ |
334 KB 104 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.js
www.gnno-aozora3.cyou/ibg/js/ |
281 KB 97 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.js
www.gnno-aozora3.cyou/ibg/js/ |
9 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
input_arrow.png
www.gnno-aozora3.cyou/ibg/images/ |
146 B 146 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: GMO Aozora Net Bank (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| Vue function| $ function| jQuery number| now0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.gnno-aozora3.cyou
87.121.112.81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